Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2025, 02:06

General

  • Target

    2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe

  • Size

    1.2MB

  • MD5

    ceca87332b6baef1d4362835c645fde4

  • SHA1

    42e1397a1919374ca330e89c56e950be9774a7f1

  • SHA256

    3078bfd761b290630321b44bf7e068922cb3ed191c98785d9f6048e5d342e346

  • SHA512

    12ad155df88d18bc250bdca709d63e2615316d046bcf8fdd9e0daab0f1d71d87e91992d4fb502d7131de061540429ad687652e05cda59733ba2e1c0d8f814714

  • SSDEEP

    24576:RbndcEBtMIgeOZ+FzZ5flLBVv0p8o30k65zQtqBG3G3ndFBex92JeDty/IZs:tndJBth/t59Fp9aDiQc6YdFBex92Jep8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 46 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-08_ceca87332b6baef1d4362835c645fde4_icedid.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\SysWOW64\rundll32.exe C:\ProgramData\appsoft\\install32.dll,installsvc installtrojan
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c start C:\Windows\system32
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:396
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\delself.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2584
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding
    1⤵
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3672
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding
    1⤵
      PID:3968
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:2364
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 784
        2⤵
        • Modifies data under HKEY_USERS
        PID:3000
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4192
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {515980c3-57fe-4c1e-a561-730dd256ab98} -Embedding
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:228

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\appsoft\install32.dat

        Filesize

        279KB

        MD5

        02adb5a63d5d4fa74ddcc9e3b6976624

        SHA1

        cbb6b7e8e537dad3892361f26837396ea9695848

        SHA256

        d40e9f8176766b4a31ac9807837c3be0e957b755b6f3dd0eb8caf44aeb032060

        SHA512

        d3458c37c9892868e63dddadf26686ba30751a40bf529fc51df0d936fcede8145446a611a82e737ee36adf55b48f73f3a72f8ce381fc880a879fec23b9c1592a

      • C:\ProgramData\appsoft\install32.dll

        Filesize

        52KB

        MD5

        b39caefae13d0dc0344380b9b19c33c4

        SHA1

        6fe41d9026112599721916a251169ca360cc18e8

        SHA256

        766cee16390c18a85fb3ec9b740986c8ab022cbc35660ff60fba6e72050d417c

        SHA512

        76136b62ebfd8c969a6bf97c6e76127b67697ec0c7da1068c9951e6be4f8c8960d57103ad429f91ddc43702debbca069ba32ac2b6c179902111f339e7090e02a

      • C:\ProgramData\appsoft\install64.dll

        Filesize

        66KB

        MD5

        f272c73937cc5ef633dfcce3f118c6e0

        SHA1

        0cd50cce9735baadb376ea5a7102123a7ab1c390

        SHA256

        242cfd9271d9b6b15128cbbd6e000ecdbce1bb6e130991cb2b8d40f1751483cc

        SHA512

        309d7caaf3c71e06288fb5d89749e28b6328262522d0524fc6082458ac146ec7014bfc4463022259d478eb8a9f97548489f014d6e2f8f180d5f047908197ee06

      • C:\ProgramData\resmon.resmoncfg

        Filesize

        1KB

        MD5

        8f490dc7ec6782d4fd16f67c1df1c5f3

        SHA1

        038e54e03f3b8faf60c69a6d4c073df99bcb5953

        SHA256

        b448c3c879a662e82f1e9dca21c53abd2c0bd2f7aab1631918a04e910e41e5ed

        SHA512

        f1e9ab048bf6ea22f9d23d080ba10b7dcf7b395f09d4f32e39dbb9f03ab75ce61508b449f4d01e9c45dd236f1f43fc394ebd8facf02089925ef3acae55deaa7c

      • C:\Users\Admin\AppData\Local\Temp\delself.bat

        Filesize

        307B

        MD5

        ee84b4ec9e7d5d14f725ba596455147f

        SHA1

        5f9e205ffb52d2293821524be39a0d165dfe6a6c

        SHA256

        e9b25efc10a6dea19e2b88a425f7ebcaaff90cebab175e8a1f12a2017892ba1d

        SHA512

        0c1875f2c8c447adec41da1d5a4a457a35a05be8505b4bc302967843da793e5689ad9e884c727fbfe5504b80e4e1d231e4e08bbe0f43799c64c9b410b31cdac6

      • memory/772-38-0x0000018CB7FA0000-0x0000018CB7FB0000-memory.dmp

        Filesize

        64KB

      • memory/772-74-0x0000018CBDCB0000-0x0000018CBDCB8000-memory.dmp

        Filesize

        32KB

      • memory/772-70-0x0000018CBC590000-0x0000018CBC598000-memory.dmp

        Filesize

        32KB

      • memory/772-54-0x0000018CB81D0000-0x0000018CB81E0000-memory.dmp

        Filesize

        64KB

      • memory/1692-2-0x0000000002430000-0x0000000002431000-memory.dmp

        Filesize

        4KB

      • memory/1692-1-0x0000000002420000-0x0000000002421000-memory.dmp

        Filesize

        4KB

      • memory/3000-83-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-90-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-100-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-104-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-76-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-77-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-78-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-79-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-80-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-81-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-82-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-105-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-86-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-87-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-85-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-89-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-91-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-101-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-88-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-84-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-92-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-93-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-94-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-95-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-97-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-96-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-98-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-99-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-102-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/3000-103-0x0000023EDC860000-0x0000023EDC870000-memory.dmp

        Filesize

        64KB

      • memory/4432-32-0x0000000002180000-0x00000000021C0000-memory.dmp

        Filesize

        256KB

      • memory/4432-30-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

        Filesize

        4KB

      • memory/4432-29-0x0000000001F30000-0x0000000001F76000-memory.dmp

        Filesize

        280KB

      • memory/4432-31-0x0000000002140000-0x000000000217E000-memory.dmp

        Filesize

        248KB

      • memory/4432-130-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

        Filesize

        4KB

      • memory/4432-131-0x0000000002180000-0x00000000021C0000-memory.dmp

        Filesize

        256KB